Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
We analyze the security of a quantum secure direct communication protocol equipped with authentication. We first propose a specific attack on the protocol by which, an adversary can break the secret already shared between Alice and Bob, when he (adversary) runs the protocol few times. The attack shows that there is a gap in authentication procedure of the protocol, and by doing so the adversary can obtain the key without remaining any trace of himself. We then give the modification of the protocol and analyze the security of it, and show how the modified protocol can close the gap.Keywords quantum secure direct communication · attack · authentication · single photon · cryptanalysis · security 1 Introduction Over the last decades, quantum cryptography plays a significant role in abstract theory of information and communication security. It is divided into some major research topics, such as QKD 1 , QSS 2 , QIA 3 , etc. which have developped from their firs publications [1-3] respectively, untill now.A new topic of quantum cryptography which has been studied at depth, comprehensively recently, is quantum secure direct communication, known as 1 quantum key distribution 2 quantum secret sharing 3 quantum identity authentication Recently many papers have been published in QSDC and some related topics such as quantum dialogue (QD) and quantum secure direct dialogue (QSDD). In 2013, Chang et al. proposed a QSDC protocol equipped with authentication [10]. Chou et al. proposed a bidirectional QSDC protocol for mobile network [14]. In 2014 Lai et al. proposed a quantum direct secret sharing (QDSD) scheme using fountain codes for eavesdropping check and authentication [15]; a pre-shared sequence of degrees and positions is applied to recognize the additional qubits. Hwang et al. introduced a new topic in quantum cryptography called quantum authencryption, combining quantum encryption and quantum authentication into one process for off-line communications [11]. Yang put forward a QSDC protocol without quantum memory; a stream is replaced by quantum data block to transmit quantum states [12]. Chang et al. proposed a controlled QSDC protocol; they used five-particle cluster state and quantum one time pad [6]. Zou and Qiu introduced a semiquantum secure direct communication protocol with classical Alice [13]. Gao analyzed the protocol proposed in [14] and suggested a possible improvement of it [16]. In 2015, to combat collective-dephasing noise and collective-rotation noise, Ye put forward two QD protocols [17] and a QSDD protocol [18]. Xiao and Xu proposed a high-capasity quantum secure communication scheme using either entangled pairs and an auxiliary single photon [19]. Hassanpour and Houshmand put forward a three-party controlled QSDC based on GHZ-like states which improves the efficiency of the previous ones [7]. Ma et al. presented a direct communication protocol of quantum network over noisy channel by which the bit-flip errors whould be corrected using a parity matrix [20]. Chang et al. put forwarda controlled determini...
We analyze the security of a quantum secure direct communication protocol equipped with authentication. We first propose a specific attack on the protocol by which, an adversary can break the secret already shared between Alice and Bob, when he (adversary) runs the protocol few times. The attack shows that there is a gap in authentication procedure of the protocol, and by doing so the adversary can obtain the key without remaining any trace of himself. We then give the modification of the protocol and analyze the security of it, and show how the modified protocol can close the gap.Keywords quantum secure direct communication · attack · authentication · single photon · cryptanalysis · security 1 Introduction Over the last decades, quantum cryptography plays a significant role in abstract theory of information and communication security. It is divided into some major research topics, such as QKD 1 , QSS 2 , QIA 3 , etc. which have developped from their firs publications [1-3] respectively, untill now.A new topic of quantum cryptography which has been studied at depth, comprehensively recently, is quantum secure direct communication, known as 1 quantum key distribution 2 quantum secret sharing 3 quantum identity authentication Recently many papers have been published in QSDC and some related topics such as quantum dialogue (QD) and quantum secure direct dialogue (QSDD). In 2013, Chang et al. proposed a QSDC protocol equipped with authentication [10]. Chou et al. proposed a bidirectional QSDC protocol for mobile network [14]. In 2014 Lai et al. proposed a quantum direct secret sharing (QDSD) scheme using fountain codes for eavesdropping check and authentication [15]; a pre-shared sequence of degrees and positions is applied to recognize the additional qubits. Hwang et al. introduced a new topic in quantum cryptography called quantum authencryption, combining quantum encryption and quantum authentication into one process for off-line communications [11]. Yang put forward a QSDC protocol without quantum memory; a stream is replaced by quantum data block to transmit quantum states [12]. Chang et al. proposed a controlled QSDC protocol; they used five-particle cluster state and quantum one time pad [6]. Zou and Qiu introduced a semiquantum secure direct communication protocol with classical Alice [13]. Gao analyzed the protocol proposed in [14] and suggested a possible improvement of it [16]. In 2015, to combat collective-dephasing noise and collective-rotation noise, Ye put forward two QD protocols [17] and a QSDD protocol [18]. Xiao and Xu proposed a high-capasity quantum secure communication scheme using either entangled pairs and an auxiliary single photon [19]. Hassanpour and Houshmand put forward a three-party controlled QSDC based on GHZ-like states which improves the efficiency of the previous ones [7]. Ma et al. presented a direct communication protocol of quantum network over noisy channel by which the bit-flip errors whould be corrected using a parity matrix [20]. Chang et al. put forwarda controlled determini...
Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014 proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.
This paper presents the first quantum entanglement establishment scheme for strangers who neither pre-share any secret nor have any authenticated classical channel between them. The proposed protocol requires only the help of two almost dishonest third parties (TPs) to achieve the goal. The security analyses indicate that the proposed protocol is secure against not only an external eavesdropper's attack, but also the TP's attack."spooky relation at a distance," which allows two or more participants who share entangled quantum states to have correlated information. Based on the concept of quantum entanglement, various quantum cryptographic protocols are possible. For example, quantum key distribution allows two remote participants to share a secure key [1]; quantum teleportation "sends" quanta to a remote location without any physical photon transmission [2]; quantum dense-coding communication allows one to transmit two-bit information via a one-bit quantum transmission; and quantum blind computation [3] allows a user to perform quantum computations with the help of a quantum server, without revealing the intended computations. In addition, quantum secret sharing [4], quantum state sharing [5], quantum remote state preparation [6], quantum signature [7], quantum private comparison [8, 9], etc., are all possible because of shared quantum entanglement states. Research has shown that if shared quantum entanglements are in incorrect states or are interrupted by malicious users during the entanglement establishment process, then incorrect results may occur, and the protocol is considered to be insecure [1, 10-16]. Accordingly, assurance of security and correctness during the establishment of entanglement becomes an imperative issue in quantum cryptography.The problem with the establishment of entanglement has been most often treated in two ways. The first is to simply assume that the entanglement is preshared by the participants [2]. The second-which is also our focus here-describes the entanglement establishment procedure in detail [1]. For this approach, one often assumes the existence of an authentication classical channel between two users, which can be used to discuss the correctness of the shared entangled states. For example, if Alice wants to share an entanglement with Bob, Alice will generate a series of entangled quantum states, which include multiple quantum particles, and transmit the entangled particles to Bob. Then Alice
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.